H3C SecPath F100-M Firewall. Installation Manual. Hangzhou H3C Technologies Co., Ltd. Manual Version: T K C-1.

Similar documents
H3C SecPath V100-S Security Gateway

H3C S1016/1024 Ethernet Switch User Manual

H3C S7500E Series Ethernet Switches

H3C MSR 20-1X Routers

H3C S7503-S7506-S7506R Ethernet Switches Power Distribution Box Installation Guide

H3C MSR 20 Routers. Installation Guide. Hangzhou H3C Technologies Co., Ltd. Document version: T K C-1.

H3C SecPath Series High-End Firewalls

Installing the Cisco Unified Videoconferencing 3545 MCU

Installing and Managing the Switch

H3C SecPath Series High-End Firewalls

H3C MSR 30 Routers. Installation Guide. Hangzhou H3C Technologies Co., Ltd. Document version: T L C-1.

H3C SecBlade SSL VPN Card

Model : ON-PS3016G. 16 Port 10/100/1000Mbps Gigabit + 2 Gigabit SFP Uplink Unmanaged PoE Switch

H3C SecPath M9000-S NSQM2MPUD0 main processing unit

Business Networking Solution. Installation Guide. 16/24-Port Gigabit Easy Smart Switch TL-SG1016DE/TL-SG1024DE

H3C S5830V2 & S5820V2 Switch Series

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd. Manual Version: 5W

Quick Installation Guide

Codian IP VCR IP VCR 2200 Series

H3C SecPath Series Security Products

HP 1920 Gigabit Ethernet Switch Series

Preparing to Install the VG248

H3C S12500 Routing Switch Series

H3C S5600 Series Ethernet Switches

H3C SecBlade SSL VPN Card

H3C S9500 Series Routing Switches

Installing the Cisco MDS 9020 Fabric Switch

Business Networking Solution. Installation Guide. JetStream Gigabit Smart Switch T1600G-28TS (TL-SG2424) T1600G-52TS (TL-SG2452)

Preparing to Install the Cisco AS5350XM Universal Gateway

Manual Version: V1.00. Video Decoder Quick Guide

Catalyst 2360 Switch Getting Started Guide

Installing the Cisco SFS 3504 Server Switch

Setting Up Your Cisco Unified Videoconferencing 3515 MCU

H3C WA4320-ACN-PI Access Point

Installing the Cisco 2524 and Cisco 2525 Routers

Catalyst 6500 Series Wireless LAN Services Module Installation and Verification Note

H3C S5120-SI Switch Series

H3C S5120-EI Switch Series

EZ Switch EZ Connect N SMCFS1601/SMCFS2401

H3C S10500 Switch Series

Installation Guide. JetStream Gigabit Smart Switch T1600G-28TS (TL-SG2424) T1600G-52TS (TL-SG2452) T1600G-28PS (TL-SG2424P) T1600G-52PS (TL-SG2452P)

H3C SR6604/SR6608 Routers

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

Installation Job Aid for Ethernet Routing Switch 3600 Series

Hardware Guide. EPIC Next Generation Firewall. USG6000 Unified Security Gateway V100R001. Give us a call:

Quick Installation Guide

H3C S12500 Series Routing Switches

PIX 515/515E. PIX 515/515E Product Overview CHAPTER

H3C WA4320i-X Access Point

User Guide TL-SG1024D 24-Port Gigabit Desktop/Rackmount Switch

H3C S5830V2 & S5820V2 Switch Series

SwitchBlade Switch Controller Quick Install Guide

H3C SecPath U200-A/U200-M/U200-S Unified Threat Management Products

NETWORKS DATA CENTER SWITCHES USER MANUAL

MX Voice Gateway Series. Installation Manual

Index. B Boot software 5-2 Bridging architecture 7-6 Broadcast filter 8-55 limiting 8-22 Buffer port 7-9 Syslog 8-17, 8-20

H3C S5120-HI Switch Series

Installing IDS Introducing IDS-4215 CHAPTER

H3C S7508E-X Switch. Installation Guide. Hangzhou H3C Technologies Co., Ltd. Document version: 6PW

H3C S9500 Series Routing Switches

PIX 520. PIX 520 Product Overview CHAPTER

16-SLOT IN-BAND MANAGEMENT CHASSIS

H3C SecPath SSL VPN. Administrator Manual. Hangzhou H3C Technologies Co., Ltd. Manual Version: 5PW

H3C WA4320i-ACN Access Point

Business Networking Solution. Installation Guide. L2 Managed Switch TL-SG3210/TL-SG3216/TL-SG3424/TL-SG3424P

Installation and Configuration Guide

Installation Manual. Table of Contents

Dell Networking S4810 Open Networking (ON) Getting Started Guide

H3C S9500 Series Routing Switches

H3C WA Series WLAN Access Points. Layer 2 WAN Command Reference. Hangzhou H3C Technologies Co., Ltd.

NETWORKS S2800 & S3900 SERIES SWITCHES USER MANUAL

Manual Version: V1.00. Video Decoder User Manual

Layer 3 - IP Routing Command Reference

Installation Job Aid for VSP 4450GTX-HT- PWR+

H3C SecPath Series High-End Firewalls

Installation Job Aid for VSP 4850GTS

ON-AI port 10/100Mbps + 1 GE & 1 SFP uplink (Combo port) AI POE Switch

H3C S5830V2 & S5820V2 Switch Series

Installing the Cisco AS5400XM Universal Gateway

Business Networking Solution. Installation Guide. Smart PoE Switch T PCT (TL-SL2428P)

Leased-Line Extenders over IP

Cisco CRS 3-Phase AC Power Distribution Unit Installation Guide 2. Cisco CRS 3-Phase AC Power Distribution Unit 2

Unified Office Gateway UMG Quick Installation Guide. Version: 1.0

! encor e networks TM

H3C S5500-EI Switch Series

Setting Up Your Cisco Unified Videoconferencing 3500 Gateway

AI180I AIswitch Series 180 Integrated Chassis Installation Guide

PIX 535. PIX 535 Product Overview CHAPTER

Dell Networking S4100-ON Series. Set-Up Guide

Installation Manual. Table of Contents

Install your TPS 440T and 2200T security devices

SNR-R7204 Router Hardware Installation Manual

How to Set Up Your SRX4100 Services Gateway

H3C S9500E Series Routing Switches

H3C S7500E Series Ethernet Switches. Network Management and Monitoring. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

HP V1910 Switch Series

Installing IDS 4215 CHAPTER. This chapter describes IDS 4215 and how to install it. It also describes the accessories and how to install them.

Installing the IPS 4345 and IPS 4360

H3C imc. Branch Intelligent Management System. User Manual. Hangzhou H3C Technologies Co., Ltd.

TE100-S16 16-Port 10/100Mbps Fast Ethernet Switch. User s Guide

Transcription:

Installation Manual Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Manual Version: T2-08049K-20070622-C-1.02

Copyright 2003-2007, Hangzhou H3C Technologies Co., Ltd. and its licensors All Rights Reserved No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. Trademarks H3C,, Aolynk,, H 3 Care,, TOP G,, IRF, NetPilot, Neocean, NeoVTL, SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V 2 G, V n G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners. Notice Technical Support The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. To obtain the latest information, please access: http://www. h3c.com customer_service@h3c.com http://www. h3c.com

About This Manual Related Documentation In addition to this manual, each H3C SecPath Series Security Products documentation set includes the following: Manual H3C SecPath Series Security Products Operation Manual H3C SecPath Series Security Products Command Manual H3C SecPath Series Security Products Web-Based Configuration Manual Description It introduces the functional features, principles and guide to configuration and operation for H3C SecPath Series Security Gateways/Firewalls. It discusses all commands available in the configuration and operation on H3C SecPath Series Security Gateways/Firewalls. The details include command name, complete command form, parameter, operation view, usage description and configuration example. It directs users to configure the H3C SecPath Series Firewalls in Web mode. Organization Installation Manual is organized as follows: Chapter 1 Product Overview 2 Installation Preparations 3 Firewall Installation 4 Firewall Configuration Contents Profiles the system characteristics and applications. Product appearance and system description are also available in this chapter. Focuses on environment requirements for system installation, precautions before and during installation. Installation tools are also listed in this chapter. Elaborates on mechanical installation, physical connection of power cords, console cables and Ethernet cables. Presents fundamentals on system booting and configuration.

Chapter 5 Software Maintenance 6 Troubleshooting 7 MIM Modules Contents Discusses system software maintenance, including software upgrade and configuration file loading. Lists common system failures and specific locating methods. Details appearance, panel and LEDs of the functional modules available on the H3C SecPath F100-M, as well as module installation and connection of interface cables. Conventions The manual uses the following conventions: I. Command conventions Convention Boldface italic [ ] { x y... } [ x y... ] { x y... } * [ x y... ] * &<1-n> Description The keywords of a command line are in Boldface. Command arguments are in italic. Items (keywords or arguments) in square brackets [ ] are optional. Alternative items are grouped in braces and separated by vertical bars. One is selected. Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected. The argument(s) before the ampersand (&) sign can be entered 1 to n times. # A line starting with the # sign is comments.

II. GUI conventions Convention Description < > [ ] / Button names are inside angle brackets. For example, click <OK>. Window names, menu items, data table and field names are inside square brackets. For example, pop up the [New User] window. Multi-level menus are separated by forward slashes. For example, [File/Create/Folder]. III. Symbols Convention Warning Caution Note Description Means reader be extremely careful. Improper operation may cause bodily injury. Means reader be careful. Improper operation may cause data loss or damage to equipment. Means a complementary description. Environmental Protection This product has been designed to comply with the requirements on environmental protection. For the proper storage, use and disposal of this product, national laws and regulations must be observed.

Table of Contents Table of Contents Chapter 1 Product Overview... 1-1 1.1 Overview... 1-1 1.2 Hardware Features... 1-3 1.2.1 Appearance... 1-3 1.2.2 System Specifications... 1-3 1.2.3 LEDs... 1-4 1.2.4 Fixed Interface Attributes... 1-4 Chapter 2 Installation Preparations... 2-1 2.1 General Site Requirements... 2-1 2.1.1 Temperature and Humidity... 2-1 2.1.2 Cleanliness... 2-1 2.1.3 ESD Prevention... 2-2 2.1.4 Electromagnetic Compatibility... 2-2 2.1.5 Lightning Protection... 2-3 2.1.6 Checking the Rack... 2-3 2.2 Safety Precautions... 2-3 2.3 Unpacking Inspections... 2-4 2.4 Installation Tools, Meters and Equipment... 2-4 Chapter 3 Firewall Installation... 3-1 3.1 Installation Flow... 3-1 3.2 Mounting the Firewall... 3-2 3.2.1 Free-Standing... 3-2 3.2.2 Rack-Mounting... 3-2 3.3 Connecting the PGND Wire... 3-3 3.4 Connecting to the Console Terminal... 3-4 3.5 Connecting to the Ethernet Interface... 3-5 3.6 Connecting the Power Cord... 3-6 3.7 Verifying Installation... 3-6 Chapter 4 Firewall Configuration... 4-1 4.1 Booting... 4-1 4.1.1 Setting Up a Configuration Environment... 4-1 4.1.2 Powering Up the Firewall... 4-3 4.1.3 Booting Process... 4-4 4.2 Configuration Fundamentals... 4-5 4.2.1 Basic Configuration Procedures... 4-5 4.2.2 Command Line Interface... 4-6 i

Table of Contents Chapter 5 Software Maintenance... 5-1 5.1 Boot Menu... 5-1 5.2 Upgrading Application and Boot ROM Using XModem... 5-2 5.3 Backing Up and Restoring the Extended Segment of the Boot ROM... 5-5 5.4 Upgrading the Application Program Using TFTP... 5-6 5.5 Uploading/Downloading Applications/Files Using FTP... 5-8 5.6 Modifying Boot ROM Password... 5-13 5.7 Resetting a Lost Password... 5-14 Chapter 6 Troubleshooting... 6-1 6.1 Troubleshooting PSU... 6-1 6.2 Troubleshooting Configuration System... 6-1 6.3 Troubleshooting Application Upgrading... 6-2 Chapter 7 MIM Modules... 7-1 7.1 MIM Options... 7-1 7.2 Installing and Removing an MIM... 7-1 7.3 Troubleshooting an MIM... 7-3 7.4 1FE/2FE/4FE Module... 7-3 7.4.1 Introduction... 7-3 7.4.2 Appearance... 7-3 7.4.3 Interface Attributes... 7-5 7.4.4 Panel and Interface LEDs... 7-5 7.4.5 Interface Cable... 7-6 7.4.6 Connecting the Interface Cable... 7-8 7.5 HNDE Module... 7-9 7.5.1 Introduction... 7-9 7.5.2 Interface Attributes... 7-9 7.5.3 Panel and Interface LEDs... 7-9 7.5.4 Troubleshooting the HNDE Module... 7-10 ii

List of Figures List of Figures Figure 1-1 Front panel of the H3C SecPath F100-M firewall... 1-3 Figure 1-2 Rear panel of the H3C SecPath F100-M firewall... 1-3 Figure 3-1 Installation flow for the firewall... 3-1 Figure 3-2 Rack-mount the firewall... 3-3 Figure 3-3 Console cable assembly... 3-4 Figure 3-4 Ethernet cable assembly... 3-5 Figure 4-1 Local configuration through the console port... 4-1 Figure 4-2 Create a new connection... 4-2 Figure 4-3 Select connection port... 4-2 Figure 4-4 Define port parameters... 4-3 Figure 5-1 Send File dialog box... 5-3 Figure 5-2 Sending File interface... 5-4 Figure 5-3 Set up the local upload/download environment... 5-9 Figure 5-4 Set up the remote upload/download environment... 5-9 Figure 7-1 Install the MIM I... 7-2 Figure 7-2 Install the MIM II... 7-2 Figure 7-3 1FE module... 7-4 Figure 7-4 2FE module... 7-4 Figure 7-5 4FE module... 7-4 Figure 7-6 1FE module panel... 7-5 Figure 7-7 2FE module panel... 7-5 Figure 7-8 4FE module panel... 7-5 Figure 7-9 Ethernet cable... 7-6 Figure 7-10 Category-5 twisted-pair cable... 7-7 Figure 7-11 HNDE module panel... 7-9 iii

List of Tables List of Tables Table 1-1 Technical specifications of the H3C SecPath F100-M firewall... 1-3 Table 1-2 LEDs on the H3C SecPath F100-M firewall... 1-4 Table 1-3 Attributes of the console port... 1-4 Table 1-4 Attributes of the AUX port... 1-5 Table 1-5 Attributes of the Ethernet interfaces... 1-5 Table 2-1 Temperature/humidity requirements in the equipment room... 2-1 Table 2-2 Limits on the dust particles in the equipment room... 2-1 Table 2-3 Harmful gas limits in the equipment room... 2-2 Table 3-1 Physical dimensions of the H3C SecPath F100-M firewall... 3-2 Table 7-1 Interface attributes of the 1FE, 2FE and 4FE modules... 7-5 Table 7-2 LEDs on the 1FE/2FE/4FE module... 7-6 Table 7-3 Straight-through cable pinout... 7-7 Table 7-4 Crossover cable pinout... 7-7 Table 7-5 Interface attributes of the HNDE module... 7-9 Table 7-6 LEDs on the HNDE module... 7-9 iv

Chapter 1 Product Overview Chapter 1 Product Overview 1.1 Overview, developed by H3C Technologies, is a new-generation firewall designed for enterprise users. It can work both as an egress firewall for small and medium businesses and as an internal firewall for midsize enterprises. H3C SecPath F100-M firewall provides three 10/100 Mbps autosensing FE interfaces and one MIM expansion slot which supports multiple VPN access types and can accommodate the 1FE/2FE/4FE and HNDE modules. H3C SecPath F100-M firewall applies ASPF status detection technique to monitor connection process and malicious commands and works together with access control lists (ACLs) to implement dynamic packet filtering. H3C SecPath F100-M firewall supports authentication, authorization, accounting (AAA), network address translation (NAT), hybrid mode, object oriented management, and flow logging to ensure security and guaranteed services to the private networks constructed on the open Internet. H3C SecPath F100-M firewall supports multiple virtual private network (VPN) services, such as layer 2 tunneling protocol (L2TP) VPN, IP security (IPsec) VPN, generic routing encapsulation (GRE) VPN, and dynamic VPN, and allows users to build various VPNs, like Internet, Intranet, and remote access VPNs using customized remote-user access approaches, such as dial-up, leased line, Virtual LAN (VLAN), and tunneling. H3C SecPath F100-M firewall provides basic routing features, including the routing information protocol (RIP), open shortest path first (OSPF), routing policy, and policy routing, as well as abundant QoS (quality of service) features, such as traffic policing, traffic shaping, and multiple queue scheduling policies. H3C SecPath F100-M firewall offers these main features: I. IP VPN solution Networks benefit enterprises in many ways; company headquarters can send important information to its branch offices quickly and conveniently. To interconnect the intranets of a company over the Internet, however, you need VPN technologies. The H3C SecPath F100-M firewall provides abundant IP VPN services: L2TP and GRE provide Layer 2 and Layer 3 tunneling respectively; IPsec provides tunnels encapsulated with a security protocol. II. Data security and reliability The H3C SecPath F100-M firewall offers: 1-1

Chapter 1 Product Overview High network security. ACL-based packet filtering detects data packet at the network and transport layers to prevent illegal intrusion. Application specific packet filter (ASPF) detects information about the application layer protocols and monitors traffic at the application layer. NAT. Other than the basic functions, the NAT also can limit the number of concurrent connections for an individual user. This eliminates the malicious resource seizures without any negative impact on general network applications. In addition, its enhanced NAT application layer gateway (ALG) function provides NAT traversal for H.323, FTP, ICMP, and so on. AAA and RADIUS user authentication VPN (including GRE, and L2TP) with the IPsec and IKE technologies to guarantee the security of private networks over the Internet. OSPF and RIP2 to offer MD5 authentication and guarantee reliable exchange of routing information. Virtual router redundancy protocol (VRRP) to provide communication line or equipment backup in case of failure. This effectively enhances network robustness and reliability. Deeper application recognition (DAR) to recognize and classify packets more deeply, enhancing the control over data flows. Active/standby switchover to protect current services against interruption, eliminating the defects of traditional networking solution, for example, VRRP networking solution. III. Online software upgrade You can upgrade the application and Boot ROM programs online to add features and extend functions. IV. Network management The H3C SecPath F100-M firewall supports SNMPv3 network management (compatible with SNMPv2c and SNMPv1) and provides powerful device management. V. Regulatory compliance Designed according to the standards dominant in China, North America, Europe, Australia, and Japan, the H3C SecPath F100-M firewall complies with the requirements of these countries and regions for electromagnetic compatibility (EMC), safety standard, and network access. 1-2

Chapter 1 Product Overview 1.2 Hardware Features 1.2.1 Appearance (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (1) MIM slot (2) Two LEDs for the fixed FE interface ETH0/0 (3) Two LEDs for the fixed FE interface ETH0/1 (4) Two LEDs for the fixed FE interface ETH0/2 (5) Fixed FE interface ETH0/0 (6) Fixed FE interface ETH0/1 (7) Fixed FE interface ETH0/2 (8) Auxiliary port (AUX) (9) Console port (CONSOLE) (10) System LED (SYS) (11) Power LED (PWR) Figure 1-1 Front panel of the H3C SecPath F100-M firewall (1) (2) (3) (1) Power switch (2) Power socket (3) Grounding screw Figure 1-2 Rear panel of the H3C SecPath F100-M firewall 1.2.2 System Specifications Table 1-1 Technical specifications of the H3C SecPath F100-M firewall Item Description MIM slot 1 Fixed interface Boot ROM DDR SDRAM Flash memory Three 10/100 Mbps FE interfaces One AUX port One console port (CONSOLE) 512 KB 256 MB 16 MB 1-3

Chapter 1 Product Overview Item Physical dimensions (H W D) Weight Power supply Max. power consumption Operating temperature Description 44 436 330 mm (1.7 17.2 13.0 in.) (excluding feet) 4 kg (8.8 lb) Rated voltage: 100 VAC to 240 VAC, 50 Hz or 60 Hz Rated current: 1.5 A 54 W 0 C to 45 C (32 F to 113 F) Operating humidity (noncondensing) 10% to 95% Note: Double data rate synchronous dynamic random access memory (DDR SDRAM) stores the communication data of the running system with the CPU. 1.2.3 LEDs Table 1-2 LEDs on the H3C SecPath F100-M firewall LED PWR SYS LINK/ACT 100M Description Power supply unit (PSU) LED: OFF means the PSU is not supplying power to the device. ON means the PSU is supplying power to the device. System operating status LED: Blinking means the system is operating normally. OFF means the system is operating abnormally. OFF means no link is present. ON means a link is present. Blinking means packets are being transmitted/received. OFF means packets are being transmitted/received at 10 Mbps on the interface. ON means packets are being transmitted/received at 100 Mbps on the interface. 1.2.4 Fixed Interface Attributes I. Console port (CONSOLE) Table 1-3 Attributes of the console port Item Description Connector RJ-45 1-4

Item Description Chapter 1 Product Overview Interface standard Baud rate Service RS-232 1,200 bps to 115,200 bps, defaults to 9,600 bps Connected to an ASCII terminal Connected to the serial interface of a local PC running terminal emulation software Command line interface (CLI) II. AUX port Table 1-4 Attributes of the AUX port Item Description Connector Interface standard Baud rate Service RJ-45 RS-232 1,200 bps to 115,200 bps Modem dialup Backup III. Ethernet interfaces The H3C SecPath F100-M firewall provides three 10/100 Mbps autosensing fast Ethernet interfaces. Their attributes are described in Table 1-5. Table 1-5 Attributes of the Ethernet interfaces Item Description Connector Interface type Frame format Operating mode RJ-45 Support MDI/MDIX autosensing. Ethernet_II Ethernet_SNAP 10/100 Mbps autosensing Half/full duplex 1-5

Chapter 2 Installation Preparations Chapter 2 Installation Preparations 2.1 General Site Requirements The H3C SecPath F100-M firewall must be used indoors. To guarantee normal operation and longevity of your device, its installation site should meet the requirements described in this chapter. 2.1.1 Temperature and Humidity The equipment room must maintain proper humidity to prevent poor insulation, electricity creepage and corrosion accompanying high humidity, or washer contraction and electrostatic discharge accompanying low humidity. In dry environments where the relative humidity is very low, electrostatic discharge (ESD) is more likely to happen causing the complementary metal-oxide-semiconductor (CMOS) circuitry to fail. Table 2-1 lists the temperature and humidity requirements. Table 2-1 Temperature/humidity requirements in the equipment room Temperature Relative humidity 0 C to 45 C (32 F to 113 F) 10% to 95% (noncondensing) 2.1.2 Cleanliness Dust is hazardous to the operating safety of your device. Dust buildup on the chassis may result in static absorption, causing poor contact of metal components or points. When indoor humidity is extremely low, this is more likely to happen to shorten the useful life of the device and cause communication failures. The equipment room must be free of explosion hazards and the electrical and magnetic conductible dust as well. The following table lists the limits on dust particles: Table 2-2 Limits on the dust particles in the equipment room Mechanical active material Dust particle Unit Particle/m³ Content 3 10 4 (No visible dust on desk in three days) Note: Dust particles diameter = 5µm 2-1

Chapter 2 Installation Preparations Besides, the equipment room should meet the rigorous limits on salt, acid and sulfide to eliminate corrosion and premature aging of some parts, as shown in the Table 2-3. Table 2-3 Harmful gas limits in the equipment room Gas Max content (mg/m3) SO 2 0.2 H 2 S 0.006 NH 3 0.05 Cl 2 0.01 2.1.3 ESD Prevention By design, the H3C SecPath F100-M firewall is ESD preventative, but excessive buildup of static electricity can still damage the card circuitry and even the entire device. On the communication network connected to the firewall, static electricity is primarily introduced from the outside electrical fields, such as the outdoor high-voltage power cabling and lightning, and from the inside system, such as indoor environment, floor material and the equipment frame. To avoid damage, ensure that: The device is well grounded. The equipment room is dust-proof. Maintain adequate temperature and humidity. Wear an ESD-preventive wrist strap and clothes when contacting the circuit board. Place the removed circuit board upward on the ESD-preventive workbench, or into a static shielded bag. Hold the circuit board by its edge when observing or moving it, avoiding direct contact with the elements on it. 2.1.4 Electromagnetic Compatibility All interference sources, from the outside or from the inside of the device/application system, adversely affect the device in the conduction patterns of capacitance coupling, inductance coupling, electromagnetic wave radiation, and common impedance (including grounding system) coupling. To prevent the interference, do the following: Take effective measures against interference from the power grid. Use a separate grounding system or lightning protection grounding from that for the power supply equipment and keep them as far as possible. Keep the device far away from strong power wireless launchers, radar launchers and high frequency and high-current equipment. Use electromagnetic shielding when necessary. 2-2

Chapter 2 Installation Preparations 2.1.5 Lightning Protection By design, the H3C SecPath F100-M firewall is lightning protective; but excessive lightning may still damage the device. To protect the device better, you are recommended to: Ensure the grounding screw of the chassis is securely connected to the earth ground. Ensure the earth point of the power socket is securely connected to the earth ground. Add a lightning arrester onto the front end of the power input to better protect the power supply from lightning strikes. 2.1.6 Checking the Rack When installing the H3C SecPath F100-M firewall, observe the following: Reserve adequate clearance at the air inlet and exhaust for adequate ventilation inside the chassis. The rack has a good ventilation system. The rack is stable enough to support the weight of the device and the installation accessories. The rack is well-grounded. 2.2 Safety Precautions When reading this manual, pay adequate attention to the following. Warning appears in operation procedures that, if performed incorrectly, might cause bodily injury to the operators or damage the device. Caution appears throughout this manual in procedures that, if performed incorrectly, might affect the operation of the device. When installing or using on the firewall, you are recommended to: Keep the firewall far away from the heat sources and water/liquid. Make sure that the firewall has been correctly grounded. Wear an ESD-preventive wrist strap in installation and maintenance, making sure that the strap has good skin contact. Do not hot swap the console cable or AUX cable. Adopt uninterrupted power supply (UPS). 2-3

Chapter 2 Installation Preparations 2.3 Unpacking Inspections Check the arrived shipment contents against the packing list, making sure all the items are included and in good condition. Contact your agent for shortage or wrong delivery. 2.4 Installation Tools, Meters and Equipment I. Tools Phillips screwdriver ESD-preventive wrist strap Static shielding bag II. Cables Grounding wire and power cord Console cable Optional cables III. Meters and other equipment Hub or LAN switch Console terminal (or a PC) Multimeter Note: The firewall is not shipped with any installation tools, meters, or equipment. You must prepare them yourself. 2-4

Chapter 3 Firewall Installation Chapter 3 Firewall Installation 3.1 Installation Flow Start Install cabinet (optional) Install the device to the specified location Connect PGND wire Connect power cord Connect the device to console terminal Check Power on Troubleshooting Normal? Yes Power off and disconnect the power cord No Power off Install MIM (optional) Connect device to Ethernet Check Connect the power cord/power on End Figure 3-1 Installation flow for the firewall 3-1

Chapter 3 Firewall Installation Caution: Before you install the H3C SecPath F100-M firewall, make sure: You have read Chapter 2 carefully. The requirements listed in Chapter 2 are matched. 3.2 Mounting the Firewall You can place the H3C SecPath F100-M firewall on a workbench/tabletop or mount it in a 19-inch standard rack. 3.2.1 Free-Standing Place the firewall on a clean and flat workbench/tabletop. To prevent any damage, observe the following: Ensure the workbench/table is stable enough. Allow 10 cm (3.9 in.) of clearance around the ventilation openings. Do not place heavy stuff on the firewall. 3.2.2 Rack-Mounting The H3C SecPath F100-M firewall is designed to be mounted in 19-inch standard racks. Table 3-1 shows its physical dimensions. Table 3-1 Physical dimensions of the H3C SecPath F100-M firewall Model Physical dimensions (H W D) H3C SecPath F100-M firewall 44 436 330 mm (1.7 17.2 13.0 in.) (excluding feet) Follow these steps to rack-mount the H3C SecPath F100-M firewall: Step 1: Check the grounding and stability of the rack. Use the screws to fix the mounting ears at both sides near the front panel of the device. Step 2: Put the device in a rack tray. Depending on the actual situation, slide the device along the guide rails to an appropriate place. Step 3: Fix the mounting ears to the rack posts with suitable antirust pan-head screws. Make sure that the device is placed horizontally and securely fixed. 3-2

Chapter 3 Firewall Installation (1 ) (3) (2) (1) Screws (four) (2) Mounting ear (3) Guide rail Figure 3-2 Rack-mount the firewall 3.3 Connecting the PGND Wire Caution: Connection of the PGND wire is an important guard against the lightning and interference. Therefore, the user must first correctly connect the PGND wire before installing and using the firewall. The H3C SecPath F100-M firewall provides a grounding screw, which must be well grounded, so as to safely conduct the inductive and leaky current to the earth ground, and thereby improve the capability of the whole device to guard against the electromagnetic interference. The grounding screw of H3C SecPath F100-M firewall, which is marked with grounding symbol, is at the right end on the real panel, as shown in Figure 1-2. Use a PGND wire to connect the grounding screw to the earth ground, and the grounding resistance should not be greater than 5-ohm. Likewise, if the firewall is installed in a 19-inch standard rack, this rack is required to be grounded too. 3-3

Chapter 3 Firewall Installation Warning: The firewall must be well grounded during its operation. Otherwise, it cannot be protected reliably from lightning, which may damage the firewall itself and even the peer device. 3.4 Connecting to the Console Terminal I. Console port The H3C SecPath F100-M firewall provides an RS-232 asynchronous serial console port, through which you can configure the device. For the attributes of the console port, refer to section 1.2.4 I. "Console port (CONSOLE). II. Console cable The console cable is an 8-core shielded cable. At one end of the cable is an RJ-45 connector that can be plugged to the console port (B) of the firewall; at the other end is a DB9 (female) connector (A), which can be plugged to the serial interface of the console terminal. Figure 3-3 illustrates a console cable. A X3 A Figure 3-3 Console cable assembly III. Connecting the console cable Before configuring the firewall through a console terminal, follow these steps to connect the console cable: Step 1: Select a console terminal. The console terminal can be either a PC or a standard ASCII terminal with an RS-232 serial interface. Step 2: Connect the cable. Turn the power switch off, connect the DB9 serial interface of the console cable to the PC, and then connect the RJ-45 interface to the console port of the firewall. Verify the connection and power up the firewall and console terminal. The console terminal shows the startup information of the firewall if the connection is correct. For details, see section Chapter 4 "Firewall Configuration. 3-4

Chapter 3 Firewall Installation 3.5 Connecting to the Ethernet Interface I. Ethernet interface H3C SecPath F100-M firewall provides three fixed 10/100 Mbps autosensing FE interfaces for connection to switches or routers through Ethernet. II. Ethernet cable The H3C SecPath F100-M firewall uses the category-5 twisted pair cable to connect its Ethernet interfaces. See Figure 3-4. Figure 3-4 Ethernet cable assembly Note: When preparing network cables, it is recommended to use shielded cables for the sake of electromagnetic compatibility. III. Connecting the Ethernet cable Take the ETH0/0 interface on the front panel of the H3C SecPath F100-M firewall for example. Follow these steps to connect its Ethernet cable: Caution: Read the symbol above the interface carefully to avoid misconnection. Step 1: Connect one end of the Ethernet cable to the firewall and the other end to the peer device. Step 2: Check that the LINK/ACT LED corresponding to ETH0/0 is on. ON means a link is present on the interface. OFF means no link is present on the interface and you should check the connection. 3-5

Chapter 3 Firewall Installation 3.6 Connecting the Power Cord The H3C SecPath F100-M firewall has AC-powered model. I. AC power supply AC input: 100 VAC to 240 VAC, 50 Hz or 60 Hz Figure 1-2 shows the power socket on an AC-powered model. II. Recommended AC power socket You are recommended to use a single-phase three-terminal socket with an earth contact, which must be properly grounded. The building ground system is often buried during the wiring engineering. Make sure that the building ground system is normal before connecting the AC power cord. III. Connecting the AC power cord Step 1: Make sure that the grounding screw on the chassis is securely connected to the earth ground. Step 2: Make sure that the power switch is in the OFF position. Connect one end of the AC power cord to the AC-input socket (100 VAC to 240 VAC) on the left end of the rear panel and the other end to the AC site power. Step 3: Push the site power to ON position. Step 4: Push the power switch of the firewall to ON position. Step 5: Check that the PWR LED on the front panel is on. ON means the power connection is correct. Step 6: Check that the SYS LED on the front panel is blinking. Blinking means the hardware system is operating normally. 3.7 Verifying Installation Each time you power up the H3C SecPath F100-M firewall during installation, verify that: Enough clearance has been reserved around the ventilation openings of the device and the workbench/rack is stable enough. Proper power supply is used. The PGND wire is correctly connected. The firewall has been correctly connected to other devices, such as a console terminal. 3-6

Chapter 3 Firewall Installation Note: The installation verification is very important, because the stability, grounding of the firewall and power supply will directly affect the operation of the firewall. 3-7

Chapter 4 Firewall Configuration Chapter 4 Firewall Configuration 4.1 Booting For the initial use of the H3C SecPath F100-M firewall, you can only make CLI configuration through the console port. 4.1.1 Setting Up a Configuration Environment I. Connecting a console terminal to the firewall Connect the RJ-45 connector of the console cable to the console port on the firewall and the DB9 connector to the serial interface on the PC (see Figure 4-1). Figure 4-1 Local configuration through the console port II. Setting terminal parameters Step 1: Start the PC (or the console terminal), run on the PC the emulation (the Terminal on Windows3.1 or the HyperTerminal on Windows 9X/Windows 2000/Windows XP for example) and create a new connection. Enter the name of the new connection in the [Name] field and click <OK>. See Figure 4-2. 4-1

Chapter 4 Firewall Configuration Figure 4-2 Create a new connection Step 2: Define terminal parameters (using the HyperTerminal on Windows XP as an example). 1) Select connection port Select the serial interface to be used from the Connect Using drop-down list. The serial interface selected here must be the one connected to the console cable. Figure 4-3 Select connection port 2) Set the connection port The [Settings] tab appears as shown in Figure 4-4, and set the serial interface parameters as follows: Bits per second = 9600 4-2

Chapter 4 Firewall Configuration Data bits = 8 Parity = None Stop bit = 1 Flow control = None Click <OK> and the HyperTerminal dialog box appears. Figure 4-4 Define port parameters 4.1.2 Powering Up the Firewall I. Checking before power-up Check the following issues before powering up the firewall: Both the power cord and the PGND wire are correctly connected. The voltage of the power supply matches the requirements. The console cable is correctly connected. The console terminal (or PC) has been started and the associated parameters have been set on it. Warning: Locate the power switch of the power supply in the equipment room before powering up the firewall. Then, if an accident occurs, you can quickly shut off the power. 4-3

Chapter 4 Firewall Configuration II. Powering up the Firewall Turn on the site power. Turn on the power switch of the firewall. III. Checking after power-up After the firewall is powered up, please check: The LEDs on the front panel are normal. Refer to section 1.2.3 LEDs for the LED description. The console terminal display is correct. After powering up the firewall, you can see the startup window on the console terminal (see section 4.1.3 Booting Process ). After the startup (or power-on self-test), you are prompted to press <Enter>. When the prompt <H3C> appears, the system is ready for your configuration. 4.1.3 Booting Process After being powered up, the firewall first runs the Boot ROM program. The terminal screen displays the following system information. Note: The contents displayed on the terminal may vary with Boot ROM versions. ************************************************** * * * H3C SecPath Series Gateway Boot ROM V1.17 * * * ************************************************** Copyright(C) 2004-2007 by Hangzhou H3C Technologies Co.,Ltd. Compiled at Wed Apr 12 17:39:36 CST 2006 Testing memory...ok! 256M bytes DDR SDRAM Memory 16M bytes Flash Memory Hardware Version is 3.0 CPLD Version is 1.0 Press Ctrl-B to enter Boot Menu 4-4

Chapter 4 Firewall Configuration Press <Ctrl+B> right now and the system will enter the Boot menu. Otherwise, the system will start the program decompression process. Note: To enter the Boot menu, you must press <Ctrl+B> within three seconds after the prompt information Press Ctrl-B to Enter Boot menu... appears. The terminal screen gives this information when the system starts decompression and initialization: System is self-decompressing... System is starting... User interface Con 0 is available. Press ENTER to get started. Press <Enter>, and the system displays (if login authentication is not enabled): <H3C> Now the firewall has entered user view and is ready for your configuration. 4.2 Configuration Fundamentals 4.2.1 Basic Configuration Procedures Following are the basic steps that you can follow to configure the firewall. Step 1: Figure out detailed networking requirements, including networking objectives, the role of the firewall in the network, transmission medium, security policy, and network reliability. Step 2: Draw a networking topology based on the requirements. Step 3: Configure IP addresses for the interfaces on the firewall. Step 4: Configure routes, and if a dynamic routing protocol is enabled, set parameters for the protocol. Step 5: Configure security features as required. Step 6: Configure reliability features as required. For more information on the configuration of protocols and functions for the firewall, see the Operation Manual and Command Manual of the corresponding product. 4-5

Chapter 4 Firewall Configuration 4.2.2 Command Line Interface I. Characteristics of CLI The command line interface (CLI) offers a series of configuration commands. It allows you to: Configure the device locally through the console port. Telnet to configure the device locally or remotely, and then telnet to access and manage other devices. Get on-line help whenever you enter <?>. Test network connectivity quickly with network diagnostic tools, such as tracert and ping. Have detailed debugging information for troubleshooting your network. Enter the conflict-free keyword portion instead of the whole command, because the CLI supports command prompting. For example, you simply need to enter dis for the display command. II. CLI In system view, all the commands are put into groups for the convenience of management, each being associated to a view. You can switch between the views by executing some particular commands. Under normal circumstances, you can only execute the commands appropriate to the view that you access. However, you are allowed to execute some common commands (such as ping, display, current-configuration, and interface) in any view. 4-6

Chapter 5 Software Maintenance Chapter 5 Software Maintenance 5.1 Boot Menu The firewall manages three types of files: Boot ROM program files Application program files Configuration files Software maintenance mainly involves upgrading/downloading Boot ROM/application program files and uploading/downloading configuration files. This section introduces the Boot menu that you use in maintaining the software of the firewall. Set up a configuration environment (see Figure 4-1) and then boot the firewall. Press <Ctrl+B> when the system prompts Press Ctrl-B to enter Boot menu. Then the system displays: Please input Boot ROM password : Caution: Press <Ctrl+B> within three seconds to access the Boot menu after the prompt Press Ctrl-B to Enter Boot menu... appears. Otherwise, the system starts decompressing the program. If you want to access the Boot menu after the system starts decompressing the program, you need to reboot the firewall. Type the correct password and press <Enter> (If no Boot ROM password has been set, just press <Enter>). The system accesses the Boot menu shown as follows: I. Boot menu on the H3C SecPath F100-M firewall Boot Menu: 1: Download application program with XMODEM 2: Download application program with NET 3: Display file in flash 4: Delete file from flash 5: Start up and ignore configuration 6: Enter debugging environment 5-1

Chapter 5 Software Maintenance 7: Boot Rom Operation Menu 8: Do not check the version of the software 9: Exit and reboot Enter your choice(1-9): Further description is given for the option 8: If you fail to upgrade the software and the system prompts invalid version although you use the correct software version, you can select this option to ignore the version check during software upgrade. Note that this option works only once when you select it. The system resumes version check after you reboot the firewall. II. Boot ROM operation menu of the H3C SecPath F100-M firewall As mentioned previously, you can select 7 in the Boot menu to enter the Boot ROM operation menu as follows: Boot ROM Operation Menu: 1: Download Boot ROM with XModem 2: Download Extended Segment of Boot ROM with XModem 3: Restore Extended Segment of Boot ROM from FLASH 4: Backup Extended Segment of Boot ROM to FLASH 5: Exit to Main Menu Enter your choice(1-5): The menu provides approaches to upgrade, back up, and restore the Boot ROM program. See the sections 5.2 Upgrading Application and Boot ROM Using XModem and 5.3 Backing Up and Restoring the Extended Segment of the Boot ROM for details. Caution: You are recommended to upgrade the software under the guidance of technical support engineers. When upgrading the firewall, make sure that the version of the Boot ROM software is consistent with the application program. 5.2 Upgrading Application and Boot ROM Using XModem You can use XModem to upgrade the software through the console port even without setting up a configuration environment. I. Upgrading the application program Step 1: Enter the Boot menu and select 1 to download an application program using XModem. These download speeds are available on the firewall: 5-2

Chapter 5 Software Maintenance Downloading application program from serial... Please choose your download speed: 1: 9600 bps 2: 19200 bps 3: 38400 bps 4: 57600 bps 5: 115200 bps 6: Exit to Main Menu Enter your choice(1-6): Step 2: Select an appropriate downloading speed (for example, 115200 bps by entering 5). Download speed is 115200 bps. Change the terminal's speed to 115200 bps, and select XModem protocol. Press ENTER key when ready. Step 3: Change your terminals baud rate (see Figure 4-4) to the same baud rate for software downloading (115200 bps in this example). After that, disconnect the terminal ([Dial-in/Disconnect]), reconnect it ([Dial-in/Dialing]), and press <Enter> to start downloading. Then the system displays: Downloading... CCCCC Note: The new baud rate takes effect only after you disconnect and reconnect the terminal emulation program. Step 4: Select [Transmit/Send File] in the HyperTerminal window. The following dialog box pops up: Figure 5-1 Send File dialog box Step 5: Click <Browse>, select the application file to be downloaded, set protocol to XModem, and click <Send>.The following interface pops up: 5-3

Chapter 5 Software Maintenance Figure 5-2 Sending File interface Step 6: After completing the downloading, the system begins writing data to the Flash memory and then displays the following information in the terminal window, indicating the completion of the downloading: XModem download completed, Packet length 8790321 bytes. System file length 7868992 bytes, http.zip file length 921329 bytes. Writing file flash:/system to FLASH... Please wait, it may take a long time ################################################ Writing into Flash Succeeds. Writing file flash:/http.zip to FLASH... Please wait, it may take a long time ########################################################################## ###### ######### Writing into Flash Succeeds. Please use 9600 bps.press <ENTER> key to reboot the system. Restore the speed of the console terminal to 9600 bps as prompted, and then disconnect and reconnect the terminal. The system boots normally. II. Upgrading the entire Boot ROM program Step 1: Enter the Boot menu, and select 7 to enter the Boot ROM operation menu. 5-4

Chapter 5 Software Maintenance Step 2: Select 1 in the Boot ROM operation menu to download the Boot ROM program using XModem. The subsequent operation steps are the same as those upgrading the application program. Caution: If you fail to upgrade the entire Boot ROM program, you cannot restore it on site. Therefore, you can only upgrade the entire Boot ROM program under the direction of technical support engineers and when it is urgently necessary. III. Upgrading the extended segment of the Boot ROM program Step 1: Enter the Boot menu, and select 7 to enter the Boot ROM operation menu. Step 2: Select 2 in the Boot ROM operation menu to download the extended segment of Boot ROM with XModem. The subsequent operation steps are the same as those for upgrading the application program. Caution: This upgrade approach is used to upgrade only a portion of the Boot ROM program, so you may make a second attempt once an error occurs. 5.3 Backing Up and Restoring the Extended Segment of the Boot ROM I. Backing up the extended segment to Flash memory Follow these steps to back up the Boot ROM program. Step 1: Enter the Boot menu, and select 7 to enter the Boot ROM operation menu. Step 2: Select 4 in the Boot ROM operation menu to copy the current extended segment of the Boot ROM program to the Flash memory. Backup Extended Segment, are you sure?[y/n] Enter Y and the system starts backing up the extended segment. If the backup attempt is successful, the following message appears: Writing to FLASH.Please wait...#### Backuping Boot ROM program to FLASH successed! 5-5

Chapter 5 Software Maintenance Step 3: When the Boot ROM operation menu appears again, select 5 to exit and reboot the firewall. II. Restoring the extended segment from the Flash memory If faults occur to the extended segment of the Boot ROM program or you upgrade it by mistake, you can restore the extended segment saved in the Flash memory to the Boot ROM following these steps: Step 1: Enter the Boot menu, and select 7 to enter the Boot ROM operation menu. Step 2: Select 3 in the Boot ROM operation menu to restore the extended segment of the Boot ROM program from the Flash memory. The system displays the following message: Restore Extended Segment, are you sure?[y/n] Enter Y and the system starts backing up the extended segment. If the restoration is successful, the system displays: Writing to Boot ROM.Please wait...###### Restoring Boot ROM program successed! Step 3: When the Boot ROM operation menu appears again, select 5 to exit and reboot the firewall. 5.4 Upgrading the Application Program Using TFTP The application program is downloaded using TFTP through the Ethernet interface. In this case, the firewall acts as the client and must be connected to the TFTP server through one of its fixed Ethernet interfaces. Caution: The TFTP server program is not shipped with the H3C SecPath F100-M firewall. You need to purchase and install it by yourself. The H3C SecPath F100-M firewall can only act as the TFTP client, so you can only upgrade the application program using TFTP in these steps: 1) Start the TFTP server. Start the TFTP server on the PC connected to the Ethernet interface on the firewall and set the path to the file to be downloaded. 2) Configure the firewall Step 1: Boot the firewall and enter the Boot menu (refer to 5.1 Boot Menu for details). Select 2 to enter the Net Port Download Menu shown as follows: 5-6

Chapter 5 Software Maintenance Net Port Download Menu: 1: Change Net Parameter 2: Download From Net 3: Exit to Main Menu Enter your choice(1-3): 1 Step 2: Select 1 in the Net Port Download Menu to set parameters for the Ethernet interface on the security gateway (including the interface in use, IP address and subnet mask of the interface) and parameters for the TFTP server (including IP address of the Ethernet interface on the TFTP server and the name of the application program). Change Download parameter Download device : ETH0/2 Download file(max 60 char) :system IP address of ETH0/2 :192.168.1.15 Subnet mask for ETH0/2 :255.255.255.0 IP address of the server :192.168.1.10 IP address of the gateway :10.110.95.117 Caution: The upgrade should be performed through interface ETH0/2 on the firewall. The IP address of the server: [192.168.1.10] field must be set to the IP address of the TFTP server connected to the Ethernet interface on the firewall. You are recommended to configure the IP addresses of the network interface on the TFTP server and that of the ETH0/2 on the firewall into the same network segment. Step 3: After you input the last parameter value, the system displays the following message and returns to the Net Port Download Menu: Saving config, please wait...ok! Net Port Download Menu: 1: Change Net Parameter 2: Download From Net 3: Exit to Main Menu Enter your choice(1-3): 2 3) Download application program using TFTP Select 2 to download the application program through TFTP. The system displays the following message: Starting the TFTP download......... 5-7

Chapter 5 Software Maintenance TFTP download completed, Packet length 8790321 bytes. System file length 7868992 bytes, http.zip file length 921329 bytes. Writing file flash:/system to FLASH... Please wait, it may take a long time #################################################################### Writing into Flash Succeeds. Writing file flash:/http.zip to FLASH... Please wait, it may take a long time ########################################################################## ###### ######### Writing into Flash Succeeds. The downloading is successful. Press <Enter> to reboot the system. 5.5 Uploading/Downloading Applications/Files Using FTP The H3C SecPath F100-M firewall offers FTP server function, which provides you another way of updating configuration files, and upgrading application and Boot ROM program. You only need to connect a FTP client, local or remote, to the firewall. When you pass the authentication, you can upload and download configuration files or applications. Note: Upload: Transfer files from PCs running FTP client to firewall, namely the put operation. Download: Transfer files from firewall to PCs running FTP client, namely the get operation. I. Setting up upload/download environment Setting up the local upload/download environment 5-8

Chapter 5 Software Maintenance Figure 5-3 Set up the local upload/download environment Step 1: Connect the PC to the Ethernet port of firewall. Step 2: Configure the IP address of the Ethernet port of firewall. Here suppose it is 10.110.10.10. Step 3: Configure the IP address of the PC. Here suppose it is 10.110.10.13. Step 4: Copy the application, Boot ROM program or configuration files to a specific path. Here suppose the path is C:\\ version. Caution: The network port IP address of the PC must be in the same network segment with that of the Ethernet port of the firewall. Setting up the remote upload/download environment Figure 5-4 Set up the remote upload/download environment Step 1: Connect the PC through WAN to any interface of the firewall. The IP addresses of the PC and the firewall can be in different network segments. Step 2: Copy the application, Boot ROM program or configuration files to a specific path. Here suppose the path is C:\\ version. 5-9

Chapter 5 Software Maintenance II. Booting FTP server Ask the technical personnel at the firewall side to make the following configuration: Step 1: Configure authentication mode. Note: You can perform AAA authentication configuration as needed. See the AAA and RADIUS configuration part in the Operation Manual and Command Manual of the corresponding product for details. Step 2: Add the username and password. [H3C] local-user VPNGateway VPNGateway is the username. Step 3: Add the password. [H3C-luser-vpngateway] password simple 123 Step 4: Add the service type and specify the FTP directory. [H3C-luser-vpngateway] service-type ftp ftp-directory flash: Step 5: Add an authority level. [H3C-luser-vpngateway] level 3 Step 6: Enable the FTP server. [H3C] ftp-server enable After the above operation, the FTP server is enabled on the firewall, and a user is set. Then, any FTP client program can access FTP server using this user name and password. III. Uploading/downloading application, configuration files and uploading Boot ROM program Step 1: Enter the path of the files or applications in DOS window, perform FTP command, and create the FTP connection to the firewall, for example: C:\version\ftp 10.110.10.10 If the connection is set up, the system displays the following message (taking Windows98 as an example): Connected to 10.110.10.10 220 FTP server ready on SecPath Gateway at User(10.110.10.10:(none)): Step 2: Access FTP server using the configured user name and password. 5-10

Chapter 5 Software Maintenance User(10.110.10.10:(none)): SecPath Gateway 331 Password required for ftp Password: 230 User ftp logged in ftp> At the prompt of ftp>, you can upload or download files. Step 3: Upload/download applications, configuration files, or upload Boot ROM programs. Note: By default, the application name of the firewall side is system, the filename is config.cfg, Boot ROM filename extension is bootrom, and the entire Boot ROM filename is bootromfull. Upload application, Boot ROM program, or configuration files. ftp> put local file remote file After the upload, at the prompt of ftp>, you can input dir to view the filenames and file sizes on the firewall. If the upload succeeds, the size of the configuration file is the same as that of the file on the host. 5-11